IT Calendar

IT Policies

Fair Computing PracticesThe following items are examples of unacceptable uses which, depending
on the circumstances and severity, may result in verbal warning, loss
of account privileges, expulsion, dismissal or criminal prosecution:

Use of computing or networking facilities to violate federal or
state laws, software license agreements, copyright, or University
regulations and policies.

Attempting to bypass standard procedures or limitations set by
Computer Services. This includes, but is not limited to, interfering
with computer security systems and accessing a file without permission.
Lack of file protection does not give the user a right to access files
other than their own without permission.

Use of computing or networking facilities for anything other than
course-related, faculty-supervised research work, or University related
work. For example, playing games and using computers for personal or
commercial gain, including use of your Central State University email
address for business purposes. For users that have access to Central
State University’s Virtual Private Network (VPN) access, use for
non-University related pursuits is permitted, provided that such
pursuits are strictly personal and non-commercial in nature. Use of a
Central State University email account is also restricted to personal
and non-commercial activities.

Use of another person's computer account. (Special exceptions
require written permission from the Director of Computer Services.)